Impact
The vulnerability is a classic cross‑site scripting flaw that occurs when the GutenKit plugin fails to properly escape user‑supplied input before rendering it in web pages. This flaw falls under CWE‑79 and enables an attacker to store malicious script code that is then served to any visitor of the compromised website. If exploited, the attacker could hijack user sessions, perform phishing attacks, or deface the site, thereby breaching the confidentiality, integrity, and availability of the web environment.
Affected Systems
This issue affects the GutenKit Block Addon developed by Ataur R. The vulnerability applies to all releases through version 2.2.2; earlier or newer releases are presumed mitigated. No specific sub‑versions are listed beyond the upper bound of 2.2.2.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is not yet listed as a known exploited vulnerability in the KEV catalog. The likely attack vector is through the plugin’s web interface where an authenticated user can inject content; the malicious script is stored and later executed when any site visitor loads the page. Successful exploitation would allow an attacker to run arbitrary client‑side code in the context of site visitors or administrators, potentially leading to credential theft or further damage.
OpenCVE Enrichment
EUVD